• 0Shopping Cart
LTRM
  • Home
  • Events
  • Volumes
  • Masthead
  • Editorial Board
  • Search
  • Menu Menu

Congressional Cybersecurity Oversight: Who’s Who and How it Works

$9.99

Categories: Books, Cybersecurity, Government Tags: Most Popular Books, New Books
  • Description
  • Reviews (0)

Description

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and businesses worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct industrial espionage against U.S. business; and by nation-state adversaries, or others intent upon creating serious disruption. These various threats mean that cybersecurity policy in many ways must be treated just like the strategic and operational plans of a country at war. The purpose of this article is to provide a road map of the various congressional committees exercising jurisdiction over matters relating to cybersecurity. First, a few thoughts are offered about the role of Congressional oversight. Second, for perspective, a brief outline of how the executive branch, in the absence of legislation between 2002 and December 2014, handled responsibility for all things cyber. Next, a discussion of Congressional cybersecurity oversight for the 114th Congress is provided, including an analysis of committee jurisdiction, leadership, membership, and key staff. Finally, the important role contributed by professional congressional staff, the Government Accountability Office, Congressional Budget Office, and the Library of Congress Congressional Research Service (CRS) is covered. My hope is that this article will add to the important discussion and foster greater understanding about Congressional oversight of cybersecurity

Reviews

There are no reviews yet.

Be the first to review “Congressional Cybersecurity Oversight: Who’s Who and How it Works” Cancel reply

Your email address will not be published. Required fields are marked *

Related products

  • A Brave New World: Applying International Law of War to Cyber-Attacks

    $9.99
    Buy Book
  • Strengthened Director Duties of Care for Cybersecurity Oversight: Evolving Expectations of Existing Legal Doctrine

    $9.99
    Buy Book
  • New Payment Methods and Insufficiencies in their Regulatory Scheme

    $9.99
    Buy Book
  • Targeting in the Cyber Domain: Legal Challenges Arising from the Application of the Principle of Distinction to Cyber Attacks

    $9.99
    Buy Book

Newsletter

Contact Us

Sales Inquiry
​Press Inquiry
​Speaking Inquiry
Job Inquiry

Privacy Policy

About

Sponsors
Membership

Submit

Articles
Notes
Symposium Proposals

Store

Lectures

Journals/Partners

  • Global Cyber Institute
  • Journal of Law & Cyber Warfare
  • Lexeprint Inc.

Lectures – Lexeprint.com

  • Lawyer’s Guide for Advising Board Members on Cybersecurity Risk Management
  • How Lawyers Can Help Clients Manage Vendors to Protect and Mitigate the Risks of a Cyber Incident
  • Exploring the Internet of Things: Implications for the Law and the Associated Risks
© Copyright - LTRM - Enfold Theme by Kriesi
Is Uncle Sam Stalking You? Abandoning Warrantless Electronic Surveillance to... Journal of Law and Cyber Warfare – Volume 3, Issue 1
Scroll to top